Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

5 Summary of Week 2

An illustration of the palm of a hand, made up of numbers and words such as 'password', 'lifehack' and 'QWERTY'.
Figure 14

This week you explored how authentication works and the role of passwords in the operation of authentication mechanisms.

You learned how weak passwords could threaten the security of digital information and your online identity. You also learned about different ways of improving your password security, including techniques for coming up with strong passwords, using password managers and two-factor authentication.

Of course attacking passwords are not the only way that attackers can gain access to systems. They can also exploit vulnerabilities in software, making it important that you keep systems up to date with the latest security fixes/patches. Attackers might also try to execute malicious software, ‘malware’, on your systems. These topics will be covered in the week ahead.

You can now go to Week 3: Malware [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)] .